General

  • Target

    JaffaCakes118_a9f4dd05848bc161f07f25e4cbd7a39c

  • Size

    193KB

  • Sample

    250118-ps7e3atjhw

  • MD5

    a9f4dd05848bc161f07f25e4cbd7a39c

  • SHA1

    3dda08ba4c98955387ddb723dec4bffaf5983eb7

  • SHA256

    6a42333eee223a81af76e46d605ca15750c1bab184f04f5d00db99b2730a29cc

  • SHA512

    dcc1ef3c4c4278b9c344d2658357dc209c2076516767b08157f01f737a4c71d07e5474b8f47d8be2a9771828feaa62137cb0ecc84d7e004b761824f17ba7939e

  • SSDEEP

    3072:yHHN8CLR+nW80MxHlyltZclt2+P2akh/LkI3XOUOOTcQ5E7W/Tuetf86kru:0HjsmYlMtOt282VhQSTcvW706R

Malware Config

Targets

    • Target

      JaffaCakes118_a9f4dd05848bc161f07f25e4cbd7a39c

    • Size

      193KB

    • MD5

      a9f4dd05848bc161f07f25e4cbd7a39c

    • SHA1

      3dda08ba4c98955387ddb723dec4bffaf5983eb7

    • SHA256

      6a42333eee223a81af76e46d605ca15750c1bab184f04f5d00db99b2730a29cc

    • SHA512

      dcc1ef3c4c4278b9c344d2658357dc209c2076516767b08157f01f737a4c71d07e5474b8f47d8be2a9771828feaa62137cb0ecc84d7e004b761824f17ba7939e

    • SSDEEP

      3072:yHHN8CLR+nW80MxHlyltZclt2+P2akh/LkI3XOUOOTcQ5E7W/Tuetf86kru:0HjsmYlMtOt282VhQSTcvW706R

    • Cycbot

      Cycbot is a backdoor and trojan written in C++..

    • Cycbot family

    • Detects Cycbot payload

      Cycbot is a backdoor and trojan written in C++.

    • Modifies WinLogon for persistence

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks